WO2001092998A2 - Translation and protection table and method of using the same to validate access requests - Google Patents
Translation and protection table and method of using the same to validate access requests Download PDFInfo
- Publication number
- WO2001092998A2 WO2001092998A2 PCT/US2001/016103 US0116103W WO0192998A2 WO 2001092998 A2 WO2001092998 A2 WO 2001092998A2 US 0116103 W US0116103 W US 0116103W WO 0192998 A2 WO0192998 A2 WO 0192998A2
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- translation
- host
- memory
- region
- protection table
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F12/00—Accessing, addressing or allocating within memory systems or architectures
- G06F12/14—Protection against unauthorised use of memory or access to memory
- G06F12/1458—Protection against unauthorised use of memory or access to memory by checking the subject access rights
- G06F12/1466—Key-lock mechanism
- G06F12/1475—Key-lock mechanism in a virtual system, e.g. with translation means
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F12/00—Accessing, addressing or allocating within memory systems or architectures
- G06F12/02—Addressing or allocation; Relocation
- G06F12/08—Addressing or allocation; Relocation in hierarchically structured memory systems, e.g. virtual memory systems
- G06F12/10—Address translation
- G06F12/1081—Address translation for peripheral access to main memory, e.g. direct memory access [DMA]
Definitions
- the present invention relates to a data network, and more particularly, relates to the arrangement and use of a region identifier field provided in translation entries of a translation and protection table (TPT).
- TPT translation and protection table
- the operating system virtualizes network hardware into a set of logical communication endpoints and multiplexes access to the hardware among these endpoints (e.g., computers, servers and/or I/O devices).
- the operating system (OS) may also implement protocols that make communication between connected endpoints reliable (e.g., transmission control protocol, TCP).
- the operating system receives a request to send a message (data) and a virtual address that specifies the location of the data associated with the message, copies the message into a message buffer and translates the virtual address.
- the OS then schedules a memory copy operation to copy data from the message buffer memory to a target device.
- a translation and protection table may be used to translate the virtual address, received in the form of descriptors, into physical addresses and to define memory regions before a host network adapter can access them (e.g., for transfer to/from a remote device) during data transfer (movement) operations.
- TPT translation and protection table
- FIG. 1 illustrates an example data network according to an embodiment of the present invention
- FIG. 2 illustrates a block diagram of a host of an example data network according to an embodiment of the present invention
- FIG. 3 illustrates a block diagram of a host of an example data network according to another embodiment of the present invention
- FIG. 4 illustrates an example software driver stack of a host of an example data network according to an embodiment of the present invention
- FIG. 5 illustrates an example translation and protection table
- FIG. 6 illustrates an example translation and protection table
- FIG. 7 illustrates an example translation and protection table entry according to the present invention
- FIG. 8 illustrates one example embodiment of how the region identifier field may be created in accordance with the present invention
- FIGS. 9A and 9B illustrate examples of descriptors
- FIG. 10 illustrates an example send processing technique according to the present invention.
- FIG. 11 illustrates an example write processing technique according to the present invention.
- the present invention is applicable for use with all types of data networks and clusters designed to link together computers, servers, peripherals, storage devices, and communication devices for communications.
- data networks may include a local area network (LAN), a wide area network (WAN), a campus area network (CAN), a metropolitan area network (MAN), a global area network (GAN), a storage area network and a system area network (SAN), including newly developed data networks using Next Generation I/O (NGIO), Future I/O (FIO), Infiniband and Server Net and those networks which may become available as computer technology develops in the future.
- LAN local area network
- WAN wide area network
- CAN campus area network
- MAN metropolitan area network
- GAN global area network
- SAN system area network
- NGIO Next Generation I/O
- FIO Future I/O
- Infiniband and Server Net those networks which may become available as computer technology develops in the future.
- LAN system may include Ethernet, FDDI (Fiber Distributed Data Interface) Token Ring LAN, Asynchronous Transfer Mode (ATM) LAN, Fiber Channel, and Wireless LAN.
- FDDI Fiber Distributed Data Interface
- ATM Asynchronous Transfer Mode
- the data network 100 may include, for example, an interconnection fabric (hereinafter referred to as Aswitched fabric @) 102 of one or more switches A, B and C and corresponding physical links, and several endpoints (nodes) which may correspond to one or more I/O units 1 and 2, computers and servers such as, for example, host 110 and host 112.
- I/O unit 1 may include one or more controllers connected thereto, including I/O controller 1 (IOC1) and I/O controller 2 (IOC2).
- I/O unit 2 may include an I/O controller 3 (ICO3) connected thereto.
- Each I/O controller 1, 2 and 3 may operate to control one or more I/O devices.
- I/O controller 1 (IOC1) of the I/O unit 1 may be connected to I/O device 122, while I/O controller 2 (IOC2) may be connected to I/O device 124.
- I/O controller 3 (IOC3) of the I/O unit 2 may be connected to I/O devices 132 and 134.
- the I/O devices may be any of several types of I/O devices, such as storage devices (e.g., a hard disk drive, tape drive) or other I/O device.
- the hosts and I/O units including attached I/O controllers and I/O devices may be organized into groups known as clusters, with each cluster including one or more hosts and typically one or more I/O units (each I/O unit including one or more I/O controllers).
- the hosts and I/O units may be interconnected via a switched fabric 102, which is a collection of switches A, B and C and corresponding physical links connected between the switches A, B and C.
- each I/O unit includes one or more I/O controller-fabric (IOC-fabric) adapters for interfacing between the switched fabric 102 and the I/O controllers (e.g., IOC1, IOC2 and IOC3).
- IOC-fabric adapter 120 may interface the I/O controllers 1 and 2 (IOC 1 and IOC2) of the I/O unit 1 to the switched fabric 102, while IOC-fabric adapter 130 interfaces the I/O controller 3 (IOC3) of the I/O unit 2 to the switched fabric 102.
- FIG. 1 The specific number and arrangement of hosts, I/O units, I/O controllers, I/O devices, switches and links shown in FIG. 1 are provided simply as an example data network. A wide variety of implementations and arrangements of any number of hosts, I/O units, I/O controllers, I/O devices, switches and links in all types of data networks may be possible.
- An example embodiment of a host e.g., host 110 or host 112 may be shown in
- a host 110 may include a processor 202 coupled to a host bus 203.
- An I/O and memory controller 204 (or chipset) may be connected to the host bus 203.
- a main memory 206 may be connected to the I/O and memory controller 204.
- An I/O bridge 208 may operate to bridge or interface between the I/O and memory controller 204 and an I/O bus 205.
- I/O controllers may be attached to I/O bus 205, including I/O controllers 210 and 212. I/O controllers 210 and 212 (including any I/O devices connected thereto) may provide bus-based I/O resources.
- One or more host-fabric adapters 220 may also be connected to the I/O bus 205.
- the host-fabric adapter 220 may be connected directly to the I/O and memory controller (or chipset) 204 to avoid the inherent limitations of the I/O bus 205 (see FIG. 3).
- the host-fabric adapter 220 may be considered to be a type of a network interface card (e.g., NIC which usually includes hardware and firmware) for interfacing the host 110 to a switched fabric 102.
- the host-fabric adapter 220 may be utilized to provide fabric communication capabilities for the host 110.
- the host-fabric adapter 220 converts data between a host format and a format that is compatible with the switched fabric 102.
- the host-fabric adapter 220 formats the data into one or more packets containing a sequence of one or more cells including header information and data information.
- the hosts or I/O units of the data network of the present invention may be compatible with an Infiniband architecture. Infiniband information/specifications are presently under development and will be published by the Infiniband Trade Association (formed August 27, 1999) having the Internet address of http://www.Infinibandta.org.
- the hosts of I/O units of the data network may also be compatible with the "Next Generation Input/Output (NGIO) Specification" as set forth by the NGIO Forum on March 26, 1999.
- the host-fabric adapter 220 may be a Host Channel Adapter (HCA), and the IOC-fabric adapters may be Target Channel Adapters (TCA).
- the host channel adapter (HCA) may be used to provide an interface between the host 110 or 112 and the switched fabric 102 via high speed serial links.
- target channel adapters (TCA) may be used to provide an interface between the switched fabric 102 and the I/O controller of either an I/O unit 1 or 2, or another network, including, but not limited to, local area network (LAN), wide area network (WAN), Ethernet, ATM and fibre channel network, via high speed serial links.
- LAN local area network
- WAN wide area network
- Ethernet ATM and fibre channel network
- Both the host channel adapter (HCA) and the target channel adapter (TCA) may be implemented in the Infiniband architecture or in compliance with "Next Generation I/O Architecture: Host Channel Adapter Software Specification, Revision 1.0" as set forth by Intel Corp., on May 13, 1999.
- each host may contain one or more host-fabric adapters (e.g., HCAs).
- HCAs host-fabric adapters
- Infiniband and NGIO are merely example embodiments or implementations of the present invention, and the invention is not limited thereto. Rather, the present invention may be applicable to a wide variety of data networks, hosts and I/O controllers.
- the I/O units and respective I/O controllers may be connected directly to the switched fabric 102 rather than as part of a host 110.
- I/O unit 1 including I/O controllers 1 and 2 (IOC1 and IOC2) and I/O unit 2 including an I/O controller 3 (IOC3) may be directly (or independently) connected to the switched fabric 102.
- the I/O units (and their connected I/O controllers and I/O devices) are attached as separate and independent I/O resources to the switched fabric 102 as shown in FIGs. 1-3, as opposed to being part of a host 110.
- the I/O units, I/O controllers and I/O devices which are attached to the switched fabric 102 may be referred to as fabric-attached I/O resources (i.e., fabric- attached I/O units, fabric-attached I/O controllers and fabric-attached I/O devices) because these components are directly attached to the switched fabric 102 rather than being connected as part of a host.
- the host 110 may detect and then directly address and exchange data with I/O units and I/O controllers (and attached I/O devices) which are directly attached to the switched fabric 102 (i.e., the fabric-attached I/O controllers), via the host-fabric adapter 220.
- a software driver stack for the host-fabric adapter 220 may be provided to allow host 110 to exchange data with remote I/O controllers and I/O devices via the switched fabric 102, while preferably being compatible with many currently available operating systems, such as Windows 2000.
- the host-fabric adapter 220 may include an internal cache 222.
- FIG. 4 illustrates an example software driver stack of a host 110 having fabric- attached I/O resources according to an example embodiment of the present invention.
- the host operating system (OS) 400 includes a kernel 410, an I/O manager 420, and a plurality of I/O controller drivers for interfacing to various I/O controllers, including I O controller drivers 430 and 432.
- the host operating system (OS) 400 may be Windows 2000, and the I/O manager 420 may be a Plug-n-Play manager.
- a fabric adapter driver software module may be provided to access the switched fabric 102 and information about fabric configuration, fabric topology and connection information.
- a driver software module may include a fabric bus driver (upper driver) 440 and a fabric adapter device driver (lower driver) 442 utilized to establish communication with a target fabric-attached agent (e.g., I/O controller), and perform functions common to most drivers, including, for example, channel abstraction, send/receive IO transaction messages, remote direct memory access (RDMA) transactions (e.g., read and write operations), queue management, memory registration, descriptor management, message flow control, and transient error handling and recovery.
- RDMA remote direct memory access
- Such software module may be provided on a tangible medium, such as a floppy disk or compact disk (CD) ROM, or via Internet downloads, which may be available for plug-in or download into the host operating system (OS) or any other viable method.
- the host 110 may communicate with I/O units and I/O controllers (and attached I/O devices) which are directly attached to the switched fabric 102 (i.e., the fabric-attached I/O controllers) using a Virtual Interface (VI) architecture.
- VI Virtual Interface
- the VI architecture comprises four basic components: virtual interface (VI) of pairs of works queues (send queue and receive queue), VI consumer which may be an application program, VI provider which may be hardware and software components responsible for instantiating VI, and completion queue (CQ).
- VI is the mechanism that allows VI consumers to directly access a VI provider.
- Each VI represents a communication endpoint, and endpoint pairs may be logically connected to support bi-directional, point-to-point data transfer.
- the host-fabric adapter 220 and VI kernel agent may constitute the VI provider to perform endpoint virtuahzation directly and subsume the tasks of multiplexing, de-multiplexing, and data transfer scheduling normally performed by the host operating system (OS) kernel 410 and device driver 442 as shown in FIG. 4.
- OS operating system
- the translation and protection table (TPT) 230 shown in FIG. 5 may be used to translate virtual addresses, received in a form of packet descriptors (e.g., a data structure that describes a request to move data), into physical addresses and to define memory regions of the host memory 206 that may be accessed by the host-fabric adapter 220 (validate access to host memory).
- the translation and protection table (TPT) 230 may also be used to validate access permission rights of the host-fabric adapter 220 and to perform address translation before accessing any other memory in the host 110.
- the translation and protection table (TPT) 230 may contain a plurality of TPT entries, for example, TPT(0), TPT( 1 ) ...
- Each TPT entry (also called translation entry) may represent a single page of the host memory 206, typically 4KB of physically contiguous host memory 206.
- the TPT table 230 may be stored within the host memory 206 or it may be stored in a different memory area of the host 110.
- Figure 6 illustrates another translation and protection table (TPT) 240 that may be used to translate virtual addresses into physical addresses.
- the translation and protection table 240 may validate access permission rights of the host- fabric adapter 220 and perform address translation before accessing any other memory in the host 110.
- Each translation and protection table 240 may contain a plurality of entries that are associated with virtual buffers.
- three virtual buffers may be associated with the translation protection table 240, namely virtual buffer A(VBa), virtual buffer B(VBb) and virtual buffer C(VBc).
- Each translation entry in the example of Fig. 6 may correspond to one page of a virtual buffer, or 4 KB of data.
- virtual buffer A includes 8 KB of data
- virtual buffer B includes 12 KB of data
- virtual buffer C includes 12 KB of data.
- the translation protection table 240 includes entries 244 and 246 for the addresses of page 1 and page 2 of virtual buffer A, respectively.
- the translation and protection table 240 also includes entries 248, 250 and 252 for the addresses of page 1, page 2 and page 3 of virtual buffer B, respectively.
- the translation and protection table 240 further includes entries 256, 258 and 260 for the addresses of page 1, page 2 and page 3 of virtual buffer C, respectively.
- the translation and protection table 240 may also include unused portions 242 that separate the pages of the different virtual buffers. That is, an unused portion 242 may separate the pages of virtual buffer A from the pages of virtual buffer B and a similar unused portion 242 may separate the pages of virtual buffer B from the pages of virtual buffer C.
- the unused portions 242 may also be provided at the beginning and end of the translation and protection table.
- FIG. 7 shows an example translation and protection table entry that includes a region identifier (also called region ID) field 330 in accordance with the present invention.
- Each TPT entry 300 may correspond to a single registered memory page and include a series of protection attributes (also referred to as access rights) 310, a translation cacheable flag 320, a region identifier field 330, a physical page address field 340, and a protection domain field 350.
- the protection domain field 350 may also be referred to as a protection tag field, especially with respect to a NGIO architecture.
- the protection attributes 310 may include, for example, a Memory Write Enable flag that indicates whether the host-fabric adapter 220 can write to a page (e.g., "1" page is write-enable, "0" page is not write-enable); a RDMA Read Enable flag that indicates whether the page can be a source of RDMA Read operation (e.g., "1" page can be source, "0" page cannot be source); and a RDMA Write Enable flag that indicates whether the page can be a target of RDMA Write operation (e.g., "1" page can be target, "0" page can not be target).
- the protection attributes 310 may control read and write access to a given memory region.
- the translation cacheable flag 320 may be utilized to specify whether the host- fabric adapter 220 may cache addresses across transaction boundaries. If the translation cacheable flag 320 is not set ("0" flag), the host-fabric adapter 220 may flush or discard a corresponding single TPT entry from the internal cache 222 and retranslate buffer and/or descriptor addresses each time a new transaction is processed. However, if the translation cacheable flag 320 is set ("1" flag), the host- fabric adapter 220 may choose to reserve or keep the corresponding single TPT entry in the internal cache 222 for future re-use. This way only a designated TPT entry as opposed to all TPT entries stored in the internal cache 222 at the end of an IO transaction may be flushed or discarded from the internal cache 222.
- the software driver of the host operating system 400 may be used to set the status of the translation cacheable flag 320 of each individual TPT entry stored in the internal cache 222.
- the physical page address field 340 may include the physical page frame address of the entry.
- the protection domain field 350 includes identifiers that are associated both with Vis and with host memory regions to define the access permission. Memory access may be allowed by the host-fabric adapter 220 if the protection domain field of the VI and of the memory region involved are identical. Attempted memory accesses that violate this rule may result in a memory protection error and no data is transferred. While the protection domain 350 may be used to deny or allow access to the translation and protection table, it is possible that different virtual buffers may be associated with a similar protection domain (or protection tag). In this situation, a wrong address may be accessed for the virtual buffer.
- the combination of that address and the memory handle can point to a translation entry of a different memory region that contains the same protection domain as the associated memory region. This error could allow the contents of the memory regions to be corrupted without detection.
- the region identifier field 330 is provided to further deny or allow access to the translation and protection table.
- the region identifier field 330 provides memory access by the host-fabric adapter 220 if the region identifier field of the virtual interface and of the memory region involved are identical.
- the region identifier field 330 thereby provides further protection functionality.
- Each translation entry associated with a specific memory region contains the same region identifier.
- Figure 7 shows a region identifier field 330 that would include a 12 bit region identifier.
- the use of 12 bits is merely an example embodiment. The present invention is not limited to this number of bits as other lengths of bits for the region identifier field 330 may also be provided in accordance with the present invention.
- the region identifier field 330 is used to determine whether a protection violation may occur and thus access to memory is denied. This use of the region identifier field 330 provides unique advantages such as the ability to additionally deny or allow access to the buffers based on information other than the protective domain field 350.
- the region identifier field 330 unlike the protection domain field 350, is mathematically related to the entries within the translation and protection table and therefore helps to further distinguish between virtual buffers. Accordingly, the region identifier field 330 may be used to deny or allow access to a memory region even if different virtual buffers are associated with a similar protection domain.
- Figure 8 shows one embodiment of how the region identifier field 330 may be obtained during memory registration or address translation by using a memory handle 400.
- the handle 400 may be 32 bits and include a 27 bit handle portion 370 and a 5 bit key portion 360.
- the 27 bit handle portion 370 is mathematically related to a specific translation entry and thus is related to a physical address of the data.
- the 5-bit key portion 360 may be assigned by the control software when a virtual memory buffer is registered.
- the 5 bit key portion 360 may be selected by any number of means such as a sequential value.
- the control software may retain a copy of the value of the last key portion used for each protection domain (i.e., for each memory buffer).
- the control software may look at the last key portion used for a given protection domain (i.e., for one memory buffer) and then advance that value to the next sequential value.
- the new value of the key portion may be saved and used as the 5 bits of the key portion 360.
- Other algorithms for advancing the value of the key portion 360 may also be used, such as random selection.
- the host-fabric adapter 220 may determine the region identifier field 330 by combining the 5 bit key portion 360 with the lower seven bits 372 of the 27 bit handle portion 370.
- the 5 bits of the key portion 360 and the lower seven bits 372 of the 27 bit handle portion 370 are merely an example embodiment.
- the present invention is also applicable to other lengths for both the key portion 360 and the handle portion 370 and the combination thereof.
- the 32 bit handle 400 may be supplied as part of the operation of requesting access to memory via the host channel adapter 220.
- the incoming message may contain the virtual address, the handle and the length of the request.
- the outgoing descriptor may contain the virtual address, the handle and the length of the buffers to be accessed.
- the 12 bit region identifier field 330 may be generated from a 32 bit handle 400, which includes the 5 bit key po ⁇ ion 360 and the 27 bit handle portion 370.
- Data transfer requests may be represented by descriptors.
- descriptors There are two general types of descriptors, send/receive and read/write (RDMA).
- Descriptors are data structures organized as a list of segments. Each descriptor may begin with a control segment followed by an optional address segment and an arbitrary number of data segments. Control segments may contain control and status information.
- Address segments, for read/write operations may contain remote buffer information (i.e., memory associated with the VI targeted to receive the read/write request).
- Data segments for both send/receive and read/write operations may contain information about the local memory (i.e., memory associated with the VI issuing the send/receive or read/write request).
- Figure 9A illustrates an example send/receive type descriptor 900 having a control segment 902 and a data segment 904.
- Data segment 904 has a segment length field 906, a memory handle field 908, and a virtual address field 910.
- the segment length field 906 specifies the length of the message to be sent or that is to be received.
- the memory handle field 908 may be used to verify that the sending/requesting process owns the registered memory region indicated by segment length 904 and virtual address 910.
- the memory handle 908 may be 32 bits in length, corresponding to the 32 bit handle 400 shown in Fig. 8 that includes the 5 bit key portion 360 and the 27 bit handle portion 370.
- the 12 bit region identifier field 330 may be formed from this memory handle 908.
- Figure 9B illustrates an example read/write type descriptor 912 having a control segment 914, an address segment 916, and a data segment 918.
- the address segment 916 has a remote memory handle field 920 and a remote virtual address field 922.
- the data segment 918 has a segment length field 924, a local memory handle field 926, and a local virtual address field 928.
- the remote memory handle 920 and the local memory handle 926 may be 32 bits in length, corresponding to the 32 bit handle 400 shown in Fig. 8 that includes the 5 bit key portion 360 and the 27 bit handle portion 370.
- the remote virtual address 922 identifies the memory location in the remote process' memory space, of the message (data) to be read.
- the amount of memory to be used to store the message is specified by the segment length field 924.
- the remote virtual address 922 identifies the memory location in the local process' memory space of the message (data) to be written.
- the local virtual address 928 identifies the starting memory location in the local process' memory space of where the message being written is stored.
- the size of the message is specified by the segment length field 924.
- the remote memory handle 920 is that memory handle associated with the memory identified by remote virtual address 922.
- the local memory handle 926 is that memory handle associated with the memory identified by local virtual address 928 and may be 32 bits in length including a 5 bit key portion 360 and a 27 bit handle portion 370.
- the 12 bit region identifier field 330 may be formed from this local memory handle 926.
- the virtual address and the associated memory handle may be used to generate a protection domain (or protection tag or protection index).
- the protection domain may be used to identify a TPT entry that corresponds to a single page of registered memory on which the posted descriptor is located.
- the 32 bit handle 400 may also be used to generate the region identifier field 330 as discussed above by using the 5 bit key portion 360 and the lower 7 bits of the 27 bit handle portion 370. If the generated region identifier field corresponds with the region identifier field of the TPT table 240 and the protection domains also match, then access to the addresses within the TPT table 240 is allowed.
- the generated region identifier field does not correspond with the region identifier field of the TPT table 240, then access to the address is denied.
- the physical address associated with the virtual address may be obtained.
- virtual address and the memory handles correspond to memory handle field 908 and virtual address field 910 of FIG. 9A.
- the virtual address and memory handle correspond to the remote memory handle 920 and remote virtual address field 922 on the remote host-fabric adapter, and local memory handle field 926 and local virtual address field 928 on the local host-fabric adapter 220 of FIG. 9B .
- An example send descriptor may be processed by the host-fabric adapter 220 in the manner as shown in FIG. 10.
- the order of the blocks in Fig. 10 are merely an example embodiment as the blocks may be performed in other orders in accordance with the present invention.
- the virtual address 910 and the memory handle 908 may be used to generate a protection domain (block 1002).
- the memory handle 908 may also be used to generate the region identifier field 330 as discussed above.
- a memory protection fault may be generated (blocks 1113 and 1114) and no data is transferred via the switched fabric 102.
- Receive descriptors may be processed in an analogous fashion.
- an example read descriptor may be processed by the host-fabric adapter 220 in the manner as shown in FIG. 11.
- the order of the blocks in Fig. 11 are merely an example embodiment as the operations may be performed in other orders in accordance with the present invention.
- the virtual address 928 and memory handle 926 may be used to generate a protection domain (block 1102).
- the memory handle 926 may be used to generate the region identifier field 330 as discussed above.
- a memory protection fault is generated (blocks 1113 or 1114) and no data is transferred via the switched fabric 102.
- Write descriptors may be processed in an analogous fashion.
- Figures 10 and 11 show one embodiment of using a protection domain and region identifier field to validate an access request.
- the order of operations shown in these figures is not limited by the disclosed order as these operations may be performed in other orders.
- One further advantage of the present invention is that each time an address is translated and its protection is checked, only one access to the translation and protection table is needed.
- the present invention is applicable to all types of redundant type networks, including, but not limited to, Infiniband, Next Generation Input/Output (NGIO), ATM, SAN (system area network, or storage area network), server net, Future Input/Output (FIO), fiber channel, Ethernet).
- NGIO Next Generation Input/Output
- FIO Future Input/Output
- FIGs. 10 and 11 may be performed by a computer processor executing instructions organized into a program module or a custom designed state machine.
- Storage devices suitable for tangibly embodying computer program instructions include all forms of non- volatile memory including, but not limited to: semiconductor memory devices such as EPROM, EEPROM, and flash devices; magnetic disks (fixed, floppy, and removable); other magnetic media such as tape; and optical media such as CD-ROM disks.
- semiconductor memory devices such as EPROM, EEPROM, and flash devices
- magnetic disks fixed, floppy, and removable
- other magnetic media such as tape
- optical media such as CD-ROM disks.
Abstract
Description
Claims
Priority Applications (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP01937536A EP1297406A2 (en) | 2000-05-31 | 2001-05-17 | Translation and protection table and method of using the same to validate access requests |
GB0227344A GB2379772B (en) | 2000-05-31 | 2001-05-17 | Translation and protection table and method of using the same to validate access requests |
AU2001263258A AU2001263258A1 (en) | 2000-05-31 | 2001-05-17 | Translation and protection table and method of using the same to validate access requests |
HK03102276A HK1050740A1 (en) | 2000-05-31 | 2003-03-31 | Translation and protection table and method of using the same to validate access requests. |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US09/583,950 | 2000-05-31 | ||
US09/583,950 US6859867B1 (en) | 2000-05-31 | 2000-05-31 | Translation and protection table and method of using the same to validate access requests |
Publications (2)
Publication Number | Publication Date |
---|---|
WO2001092998A2 true WO2001092998A2 (en) | 2001-12-06 |
WO2001092998A3 WO2001092998A3 (en) | 2002-12-27 |
Family
ID=24335281
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/US2001/016103 WO2001092998A2 (en) | 2000-05-31 | 2001-05-17 | Translation and protection table and method of using the same to validate access requests |
Country Status (7)
Country | Link |
---|---|
US (1) | US6859867B1 (en) |
EP (1) | EP1297406A2 (en) |
CN (1) | CN1432149A (en) |
AU (1) | AU2001263258A1 (en) |
GB (1) | GB2379772B (en) |
HK (1) | HK1050740A1 (en) |
WO (1) | WO2001092998A2 (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2003092261A2 (en) * | 2002-04-25 | 2003-11-06 | August Technology Corporation | Data grabber with switched fabric interface |
CN1308835C (en) * | 2002-09-05 | 2007-04-04 | 国际商业机器公司 | Far-end divect memory access invocating memory management unloading of network adapter |
WO2016093895A1 (en) * | 2014-12-11 | 2016-06-16 | Applied Micro Circuits Corporation | Generating and/or employing a descriptor associated with a memory translation table |
Families Citing this family (38)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7624156B1 (en) | 2000-05-23 | 2009-11-24 | Intel Corporation | Method and system for communication between memory regions |
US7181541B1 (en) * | 2000-09-29 | 2007-02-20 | Intel Corporation | Host-fabric adapter having hardware assist architecture and method of connecting a host system to a channel-based switched fabric in a data network |
US7107359B1 (en) | 2000-10-30 | 2006-09-12 | Intel Corporation | Host-fabric adapter having hardware assist architecture and method of connecting a host system to a channel-based switched fabric in a data network |
DE60142152D1 (en) * | 2000-12-15 | 2010-07-01 | Ibm | Virtualization of I / O adapter resources |
US20020161887A1 (en) * | 2001-04-27 | 2002-10-31 | Foster Michael S. | Method and system for performing security via de-registration in a communications network |
US7447778B2 (en) * | 2002-05-06 | 2008-11-04 | Qlogic, Corporation | System and method for a shared I/O subsystem |
US20040030763A1 (en) * | 2002-08-08 | 2004-02-12 | Manter Venitha L. | Method for implementing vendor-specific mangement in an inifiniband device |
US7120858B2 (en) * | 2002-08-21 | 2006-10-10 | Sun Microsystems, Inc. | Method and device for off-loading message digest calculations |
US7937554B2 (en) * | 2002-11-12 | 2011-05-03 | Broadcom Corporation | System and method for managing memory |
US7171539B2 (en) * | 2002-11-18 | 2007-01-30 | Arm Limited | Apparatus and method for controlling access to a memory |
US7565504B2 (en) * | 2003-03-27 | 2009-07-21 | Hewlett-Packard Development Company, L.P. | Memory window access mechanism |
US8291176B2 (en) * | 2003-03-27 | 2012-10-16 | Hewlett-Packard Development Company, L.P. | Protection domain groups to isolate access to memory windows |
US7103744B2 (en) * | 2003-03-27 | 2006-09-05 | Hewlett-Packard Development Company, L.P. | Binding a memory window to a queue pair |
US7277995B2 (en) * | 2003-10-29 | 2007-10-02 | Dot Hill Systems Corporation | Storage controller and method for performing host access control in the host interface adapter |
US7296101B2 (en) * | 2004-02-17 | 2007-11-13 | Intel Corporation | Method and system for using a patch module to process non-posted request cycles and to control completions returned to requesting device |
JP2006005719A (en) * | 2004-06-18 | 2006-01-05 | Fujitsu Ltd | Address conversion program, program utilizing method, information processor and computer readable medium |
GB2425230B (en) * | 2005-04-15 | 2011-03-23 | Filmlight Ltd | A method and apparatus for image processing |
KR101137867B1 (en) * | 2005-08-30 | 2012-04-20 | 엘지디스플레이 주식회사 | Apparatus and method for inspectionn liquid crystal display device |
US7639715B1 (en) | 2005-09-09 | 2009-12-29 | Qlogic, Corporation | Dedicated application interface for network systems |
US7735099B1 (en) | 2005-12-23 | 2010-06-08 | Qlogic, Corporation | Method and system for processing network data |
US7949008B2 (en) * | 2006-01-30 | 2011-05-24 | International Business Machines Corporation | Method, apparatus and computer program product for cell phone security |
US7636800B2 (en) * | 2006-06-27 | 2009-12-22 | International Business Machines Corporation | Method and system for memory address translation and pinning |
US8249089B2 (en) * | 2006-09-29 | 2012-08-21 | Intel Corporation | Methods for pushing address translations mappings to PCI express endpoints |
US8200910B2 (en) * | 2008-02-01 | 2012-06-12 | International Business Machines Corporation | Generating and issuing global shared memory operations via a send FIFO |
US8275947B2 (en) * | 2008-02-01 | 2012-09-25 | International Business Machines Corporation | Mechanism to prevent illegal access to task address space by unauthorized tasks |
US8146094B2 (en) * | 2008-02-01 | 2012-03-27 | International Business Machines Corporation | Guaranteeing delivery of multi-packet GSM messages |
US8255913B2 (en) * | 2008-02-01 | 2012-08-28 | International Business Machines Corporation | Notification to task of completion of GSM operations by initiator node |
US8239879B2 (en) * | 2008-02-01 | 2012-08-07 | International Business Machines Corporation | Notification by task of completion of GSM operations at target node |
US8484307B2 (en) * | 2008-02-01 | 2013-07-09 | International Business Machines Corporation | Host fabric interface (HFI) to perform global shared memory (GSM) operations |
US8214604B2 (en) * | 2008-02-01 | 2012-07-03 | International Business Machines Corporation | Mechanisms to order global shared memory operations |
US20140146065A1 (en) * | 2012-11-29 | 2014-05-29 | Nvidia Corporation | Mpi communication of gpu buffers |
CN103106048A (en) * | 2013-01-30 | 2013-05-15 | 浪潮电子信息产业股份有限公司 | Multi-control multi-activity storage system |
GB2539428B (en) * | 2015-06-16 | 2020-09-09 | Advanced Risc Mach Ltd | Data processing apparatus and method with ownership table |
US20180004681A1 (en) * | 2016-07-02 | 2018-01-04 | Intel Corporation | Systems, Apparatuses, and Methods for Platform Security |
CN109582247B (en) * | 2018-12-10 | 2022-04-22 | 浪潮(北京)电子信息产业有限公司 | Host-to-storage system IO transmission method and storage system |
US11573710B2 (en) * | 2019-08-20 | 2023-02-07 | Microsoft Technology Licensing, Llc | Protection domains for files at file-level or page-level |
GB2594062B (en) * | 2020-04-14 | 2022-07-27 | Advanced Risc Mach Ltd | Data integrity check for granule protection data |
US11526451B2 (en) * | 2020-12-23 | 2022-12-13 | Intel Corporation | Secure address translation services using bundle access control |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO1999035579A1 (en) * | 1998-01-07 | 1999-07-15 | Tandem Computers Incorporated | Two-level address translation and memory registration system and method |
Family Cites Families (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB2260004B (en) * | 1991-09-30 | 1995-02-08 | Apple Computer | Memory management unit for a computer system |
US5915088A (en) * | 1996-12-05 | 1999-06-22 | Tandem Computers Incorporated | Interprocessor messaging system |
US6243829B1 (en) * | 1998-05-27 | 2001-06-05 | Hewlett-Packard Company | Memory controller supporting redundant synchronous memories |
US6647423B2 (en) * | 1998-06-16 | 2003-11-11 | Intel Corporation | Direct message transfer between distributed processes |
US7350028B2 (en) * | 1999-05-21 | 2008-03-25 | Intel Corporation | Use of a translation cacheable flag for physical address translation and memory protection in a host |
US6243787B1 (en) * | 2000-04-27 | 2001-06-05 | Mellanox Technologies Ltd. | Synchronization of interrupts with data pockets |
US6345347B1 (en) * | 1999-09-27 | 2002-02-05 | International Business Machines Corporation | Address protection using a hardware-defined application key |
US6421769B1 (en) * | 1999-12-30 | 2002-07-16 | Intel Corporation | Efficient memory management for channel drivers in next generation I/O system |
-
2000
- 2000-05-31 US US09/583,950 patent/US6859867B1/en not_active Expired - Fee Related
-
2001
- 2001-05-17 GB GB0227344A patent/GB2379772B/en not_active Expired - Fee Related
- 2001-05-17 AU AU2001263258A patent/AU2001263258A1/en not_active Abandoned
- 2001-05-17 CN CN01810431.2A patent/CN1432149A/en active Pending
- 2001-05-17 EP EP01937536A patent/EP1297406A2/en not_active Withdrawn
- 2001-05-17 WO PCT/US2001/016103 patent/WO2001092998A2/en active Application Filing
-
2003
- 2003-03-31 HK HK03102276A patent/HK1050740A1/en not_active IP Right Cessation
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO1999035579A1 (en) * | 1998-01-07 | 1999-07-15 | Tandem Computers Incorporated | Two-level address translation and memory registration system and method |
Non-Patent Citations (5)
Title |
---|
A. J. VAN DE GOOR: "Computer Architecture and Design" , ADDISON-WESLEY PUBLISHING COMPANY , 1989 XP002216245 ISBN: 0-201-182416 page 288 -page 293 * |
COMPAQ COMPUTER CORP., INTEL CORPORATION AND MICROSOFT CORPORATION: "Virtual Interface Architecture Specification Version 1.0" , [Online] 16 December 1997 (1997-12-16), pages 1-83, XP002216244 Retrieved from the Internet: <URL:ftp://download.intel.com/design/serve rs/vi/VI_Arch_Specification10.pdf> [retrieved on 2002-10-09] * |
DUNNING D ET AL: "THE VIRTUAL INTERFACE ARCHITECTURE" IEEE MICRO, IEEE INC. NEW YORK, US, vol. 18, no. 2, 1 March 1998 (1998-03-01), pages 66-76, XP000751588 ISSN: 0272-1732 * |
EICKEN VON T ET AL: "EVOLUTION OF THE VIRTUAL INTERFACE ARCHITECTURE" COMPUTER, IEEE COMPUTER SOCIETY, LONG BEACH., CA, US, US, vol. 31, no. 11, November 1998 (1998-11), pages 61-68, XP000824427 ISSN: 0018-9162 * |
MOHAMMAD BANIKAZEMI, BULENT ABALI AND DHABALESWAR K PANDA: "Comparison and Evaluation of Design Choices for Implementing the Virtual Interface Architecture (VIA)" NETWORK-BASED PARALLEL COMPUTING. COMMUNICATION, ARCHITECTURE, AND APPLICATIONS FOR NETWORK-BASED PARALLEL COMPUTING, 4TH INTERNATIONAL WORKSHOP, CANPC 2000. PROCEEDINGS (LNCS VOL. 1797)., 8 January 2000 (2000-01-08), pages 145-161, XP001117458 Toulouse, France ISBN: 3-540-67879-4 * |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2003092261A2 (en) * | 2002-04-25 | 2003-11-06 | August Technology Corporation | Data grabber with switched fabric interface |
WO2003092261A3 (en) * | 2002-04-25 | 2007-12-21 | August Technology Corp | Data grabber with switched fabric interface |
CN1308835C (en) * | 2002-09-05 | 2007-04-04 | 国际商业机器公司 | Far-end divect memory access invocating memory management unloading of network adapter |
US7299266B2 (en) | 2002-09-05 | 2007-11-20 | International Business Machines Corporation | Memory management offload for RDMA enabled network adapters |
WO2016093895A1 (en) * | 2014-12-11 | 2016-06-16 | Applied Micro Circuits Corporation | Generating and/or employing a descriptor associated with a memory translation table |
US10083131B2 (en) | 2014-12-11 | 2018-09-25 | Ampere Computing Llc | Generating and/or employing a descriptor associated with a memory translation table |
Also Published As
Publication number | Publication date |
---|---|
GB2379772B (en) | 2004-06-09 |
CN1432149A (en) | 2003-07-23 |
AU2001263258A1 (en) | 2001-12-11 |
HK1050740A1 (en) | 2003-07-04 |
WO2001092998A3 (en) | 2002-12-27 |
EP1297406A2 (en) | 2003-04-02 |
US6859867B1 (en) | 2005-02-22 |
GB0227344D0 (en) | 2002-12-31 |
GB2379772A (en) | 2003-03-19 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US6859867B1 (en) | Translation and protection table and method of using the same to validate access requests | |
US7350028B2 (en) | Use of a translation cacheable flag for physical address translation and memory protection in a host | |
CA2432113C (en) | Method and apparatus for multilevel translation and protection table | |
US6647423B2 (en) | Direct message transfer between distributed processes | |
US6725296B2 (en) | Apparatus and method for managing work and completion queues using head and tail pointers | |
US8244826B2 (en) | Providing a memory region or memory window access notification on a system area network | |
EP1399829B1 (en) | End node partitioning using local identifiers | |
US6938138B2 (en) | Method and apparatus for managing access to memory | |
US6948004B2 (en) | Host-fabric adapter having work queue entry (WQE) ring hardware assist (HWA) mechanism | |
US6789143B2 (en) | Infiniband work and completion queue management via head and tail circular buffers with indirect work queue entries | |
US7010633B2 (en) | Apparatus, system and method for controlling access to facilities based on usage classes | |
US7555002B2 (en) | Infiniband general services queue pair virtualization for multiple logical ports on a single physical port | |
US7233570B2 (en) | Long distance repeater for digital information | |
US6829685B2 (en) | Open format storage subsystem apparatus and method | |
US20030061296A1 (en) | Memory semantic storage I/O | |
US8255667B2 (en) | System for managing memory | |
US20080098197A1 (en) | Method and System For Address Translation With Memory Windows | |
US7092401B2 (en) | Apparatus and method for managing work and completion queues using head and tail pointers with end-to-end context error cache for reliable datagram | |
JP2004523035A (en) | Method and apparatus for controlling the flow of data between data processing systems via a memory | |
JP2004523829A (en) | Method and apparatus for controlling the flow of data between data processing systems via a memory | |
US7624156B1 (en) | Method and system for communication between memory regions | |
JP2004520646A (en) | Method and apparatus for transferring an interrupt from a peripheral device to a host computer system | |
US6601148B2 (en) | Infiniband memory windows management directly in hardware | |
US20030058875A1 (en) | Infiniband work and completion queue management via head only circular buffers | |
EP1543658B1 (en) | One shot rdma having a 2-bit state |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A2 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG US UZ VN YU ZA ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A2 Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE TR BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
DFPE | Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101) | ||
WWE | Wipo information: entry into national phase |
Ref document number: IN/PCT/2002/01648/MU Country of ref document: IN |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2001937536 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: GB0227344.9 Country of ref document: GB |
|
WWE | Wipo information: entry into national phase |
Ref document number: 018104312 Country of ref document: CN |
|
AK | Designated states |
Kind code of ref document: A3 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG US UZ VN YU ZA ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A3 Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE TR BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG |
|
WWP | Wipo information: published in national office |
Ref document number: 2001937536 Country of ref document: EP |
|
NENP | Non-entry into the national phase |
Ref country code: JP |